Search results for: smart security
2187 Unitary Federalism in Nigeria: Implications for Continued Corporate Existence of Nigeria
Authors: Chukwudi S. Osondu
Abstract:
Currently, the two most economically viable states in Nigeria, Lagos State and Rivers, are challenging the National Government over the legality of the latter’s continued collection and disbursement of the Value Added Tax (VAT) in their respective states. These states recently enacted laws empowering their respective states agencies to collect and administer the Value Added Tax (VAT) in their states. Before now, it was the Federal Inland Revenue Service (FIRS) that is mandated by the National Government to collect VAT throughout the Federation, and have same administered by the Federal Revenue Mobilization Allocation and Fiscal Commission, another Federal agency. Most states in the South-South and South-West geopolitical zones and a handful of states in the South-East are supportive of the actions taken by Lagos and Rivers states and are ready to follow suit. This action is seen as the beginning of resistance by the states over the continued strangulating over-centralized systems operating in the country. The Nigeria Federation has over the years operated a unitary system with grave consequences for development and possible implosion of the polity. The Quota System, the Federal Character policy, the control of the natural resources, and the security infrastructure by the National Government have been in place for decades with the attendant misgivings by some sections in the Nigeria Project. This paper evaluates the impact of the over-centralization power on the National Government with reference to fiscal policies, security, resource exploitation, infrastructural development, and national cohesion. It concludes that “unitary federalism” scuttles national development, inflames disunity, and stokes dissatisfaction among states in the federation. The paper concludes by suggesting a federation where power is devolved to the states, with the states as the federating units allowed to, each develop at its own pace.Keywords: peace, conflict, insecurity, corporate existence, sustainable development, peaceful coexistence
Procedia PDF Downloads 3712186 Blockchain-Based Assignment Management System
Authors: Amogh Katti, J. Sai Asritha, D. Nivedh, M. Kalyan Srinivas, B. Somnath Chakravarthi
Abstract:
Today's modern education system uses Learning Management System (LMS) portals for the scoring and grading of student performances, to maintain student records, and teachers are instructed to accept assignments through online submissions of .pdf,.doc,.ppt, etc. There is a risk of data tampering in the traditional portals; we will apply the Blockchain model instead of this traditional model to avoid data tampering and also provide a decentralized mechanism for overall fairness. Blockchain technology is a better and also recommended model because of the following features: consensus mechanism, decentralized system, cryptographic encryption, smart contracts, Ethereum blockchain. The proposed system ensures data integrity and tamper-proof assignment submission and grading, which will be helpful for both students and also educators.Keywords: education technology, learning management system, decentralized applications, blockchain
Procedia PDF Downloads 812185 Participatory Approach: A Tool for Improving Food Security and Empowering a Local Community in Chitima, Mozambique
Authors: Matias Hargreaves, Martin Del Valle, Diego Rodriguez, Riveros Jose Luis
Abstract:
Trough years, all kind of social development projects have tried to solve social problems such as hunger, poverty, malnutrition, food insecurity, among others, with poor success. Both private and state initiatives have invested resources in several countries and communities. Nevertheless, most of these initiatives are scientific or external developers-centered, with a lack of local participation. This compromises the sustainability of any intervention and also leads to a poor empowerment of local community. The participatory approach aims to rescue and enhance the local knowledge since it recognizes that this kind of problems are better known by native actors. The objective of the study was to describe the role played by the community empowerment on food security improvement in the NGO “O Viveiro” (15°43'37.77"S; 32°46'27.53"E) and Barrio Broma village (15°43'58.78"S; 32°46'7.27"E) in Chitima, Mozambique. A center for training in goat livestock and orchard was build. A community orchard was co-constructed between foreign technicians and local actors. The prototype was installed in February, 2016 by the technician team and local community with 16 m2 as a nursery garden. Two orchard workshops were conducted in order to design a sustainable productive model which mixes both local and technological approaches. Two goat meat workshops were conducted in order to describe local methods and train the community to conduce their own techniques with high sanitary and productive standards. Technician team stayed in Mozambique until May, 2016. The quorum for the orchard workshops was 20 and 14 persons respectively, which represents 100% and 70%of the total requested quorum (20). For the goat meat workshops were 4 and 5 persons, which representa80% and 100% of the total requested quorum (5). Until August, 2016, the orchard is 3.219 m2 and it grows several vegetables as beans, chili pepper, garlic, onion, tomatoes, lettuce, sweet potato, yuca potato, cabbage, eggplant, papaya trees, mango, and cassava. The process of increasing in size and diversification of vegetables grown was led entirely by the local community. In connection with this, the local community started to harvest and began to sell the vegetable products at the local market. At the meat goat workshops, local participants rescued a local knowledge by describing and practicing a traditional way to process goat meat by drying it outdoors and then doing a smoked treatment. This information might contribute to describe the level of empowerment of this community, and thus give evidence of acceptance of foreign intervention for improving their own proceedings and traditions.Keywords: children malnutrition, food security, Local community, participatory approach
Procedia PDF Downloads 2722184 Factors Influencing Violence Experienced by Medical Staff in Primary Health Care Centers, Taif City
Authors: Turki Adnan Kamal, Abdulmajeed Ahmad Alsofiany, Nemer Khidhran Husain Alghamdi, Ali Eissa Hassan Al-Rajhi
Abstract:
Background:- Health care workers are ranked as one of the most vulnerable groups experiencing violence and aggressive behavior compared to other occupational groups. Objectives:- To estimate the prevalence rate and characteristics and assess the avoidance measures, and notification of the violence among medical staff working in primary health care centers in Taif city. Subject and methods:- A cross-sectional study design was applied among all physicians and a representative sample of nurses working in primary health care centers affiliated with the Ministry of Health (MOH) in Taif city. A predesigned Arabic/English validated self-administered questionnaire was used. Results:- In this study, 56 physicians and 145 nurses responded, giving a response rate of 77.6%. Their age ranged from 25 and 60 years (36.2±8.2), with 59.7% of them aged between 25 and 35 years. Males represent 55.7% of them. More than half of them (52.2%) were Saudis. The prevalence of workplace violence was 30.3%. Verbal abuse was the commonest reported type (86.9%). The absence of security, training on the procedures that must be followed and special uniforms at the workplace were significantly associated with workplace violence. We concluded that workplace violence is a significant problem facing a considerable proportion of HCWs in primary health care centers in Taif, Saudi Arabia. Most violence incidents were verbal. Conclusion:- Findings of this study revealed that HCWs who were dealing with male patients only were at high risk of workplace violence and the absence of measures to avoid workplace violence, particularly security, training on the procedures that must be followed and special uniform at the workplace was significantly associated with workplace violence.Keywords: violence, workplace, primary health care, prevalence, avoidance
Procedia PDF Downloads 942183 State of Emergency in Turkey (July 2016-July 2018): A Case of Utilization of Law as a Political Instrument
Authors: Neslihan Cetin
Abstract:
In this study, we will aim to analyze how the period of the state of emergency in Turkey lead to gaps in law and the formation of areas in which there was a complete lack of supervision. The state of emergency that was proclaimed following the coup attempt of July 15, 2016, continued until July 18, 2018, that is to say, 2 years, without taking into account whether the initial circumstances persisted. As part of this work, we claim that the state of emergency provided the executive power with important tools for governing, which it took constant use. We can highlight how the concern for security at the center of the basic considerations of the people in a city was exploited as a foundation by the military power in Turkey to interfere in the political, legal, and social spheres. The constitutions of 1924, 1961, and 1982 entrusted the army with the role of protector of the integrity of the state. This became an instrument at the hands of the military to legitimize their interventions in the name of public security. Its interventions in the political field are indeed politically motivated. The constitution, the legislative, and regulatory systems are modified and monopolized by the military power that dominates the legislative, regulatory, and judicial power, leading to a state of exception. With the political convulsions over a decade, the government was able to usurp the instrument called the state of exception. In particular, the decree-laws of the state of emergency, which the executive makes frequent and generally abusive use, became instruments in the hands of the government to take measures that it wishes to escape from the rules and the pre-established control mechanisms. Thus the struggle against the political opposition becomes more unbalanced and destructive. To this must also be added the ineffectiveness of ex-post controls and domestic remedies. This research allows us to stress how a legal concept, such as ‘the state of emergency’ can be politically exploited to make it a legal weapon that continues to produce victims.Keywords: constitutional law, state of emergency, rule of law, instrumentalization of law
Procedia PDF Downloads 1422182 Towards a Strategic Framework for State-Level Epistemological Functions
Authors: Mark Darius Juszczak
Abstract:
While epistemology, as a sub-field of philosophy, is generally concerned with theoretical questions about the nature of knowledge, the explosion in digital media technologies has resulted in an exponential increase in the storage and transmission of human information. That increase has resulted in a particular non-linear dynamic – digital epistemological functions are radically altering how and what we know. Neither the rate of that change nor the consequences of it have been well studied or taken into account in developing state-level strategies for epistemological functions. At the current time, US Federal policy, like that of virtually all other countries, maintains, at the national state level, clearly defined boundaries between various epistemological agencies - agencies that, in one way or another, mediate the functional use of knowledge. These agencies can take the form of patent and trademark offices, national library and archive systems, departments of education, departments such as the FTC, university systems and regulations, military research systems such as DARPA, federal scientific research agencies, medical and pharmaceutical accreditation agencies, federal funding for scientific research and legislative committees and subcommittees that attempt to alter the laws that govern epistemological functions. All of these agencies are in the constant process of creating, analyzing, and regulating knowledge. Those processes are, at the most general level, epistemological functions – they act upon and define what knowledge is. At the same time, however, there are no high-level strategic epistemological directives or frameworks that define those functions. The only time in US history where a proxy state-level epistemological strategy existed was between 1961 and 1969 when the Kennedy Administration committed the United States to the Apollo program. While that program had a singular technical objective as its outcome, that objective was so technologically advanced for its day and so complex so that it required a massive redirection of state-level epistemological functions – in essence, a broad and diverse set of state-level agencies suddenly found themselves working together towards a common epistemological goal. This paper does not call for a repeat of the Apollo program. Rather, its purpose is to investigate the minimum structural requirements for a national state-level epistemological strategy in the United States. In addition, this paper also seeks to analyze how the epistemological work of the multitude of national agencies within the United States would be affected by such a high-level framework. This paper is an exploratory study of this type of framework. The primary hypothesis of the author is that such a function is possible but would require extensive re-framing and reclassification of traditional epistemological functions at the respective agency level. In much the same way that, for example, DHS (Department of Homeland Security) evolved to respond to a new type of security threat in the world for the United States, it is theorized that a lack of coordination and alignment in epistemological functions will equally result in a strategic threat to the United States.Keywords: strategic security, epistemological functions, epistemological agencies, Apollo program
Procedia PDF Downloads 742181 A Review on Intelligent Systems for Geoscience
Authors: R Palson Kennedy, P.Kiran Sai
Abstract:
This article introduces machine learning (ML) researchers to the hurdles that geoscience problems present, as well as the opportunities for improvement in both ML and geosciences. This article presents a review from the data life cycle perspective to meet that need. Numerous facets of geosciences present unique difficulties for the study of intelligent systems. Geosciences data is notoriously difficult to analyze since it is frequently unpredictable, intermittent, sparse, multi-resolution, and multi-scale. The first half addresses data science’s essential concepts and theoretical underpinnings, while the second section contains key themes and sharing experiences from current publications focused on each stage of the data life cycle. Finally, themes such as open science, smart data, and team science are considered.Keywords: Data science, intelligent system, machine learning, big data, data life cycle, recent development, geo science
Procedia PDF Downloads 1332180 Food and Nutritional Security in the Context of Climate Change in Ethiopia: Using Household Panel Data
Authors: Aemro Tazeze Terefe, Mengistu K. Aredo, Abule M. Workagegnehu, Wondimagegn M. Tesfaye
Abstract:
Climate-induced shocks have been shown to reduce agricultural production and cause fluctuation in output in developing countries. When livelihoods depend on rain-fed agriculture, climate-induced shocks translate into consumption shocks. Despite the substantial improvements in household consumption, climate-induced shocks, and other factors adversely affect consumption dynamics at the household level in Ethiopia. Therefore, household consumption dynamics in the context of climate-induced shocks help to guide resilience capacity and establish appropriate interventions and programs. The research employed three-round panel data based on the Ethiopian Socioeconomic Survey with spatial rainfall data to define unique measures of rainfall variability. The linear dynamic panel model results show that the lagged value of consumption, market shocks, and rainfall variability positively affected consumption dynamics. In contrast, production shocks, temperature, and amount of rainfall had a negative relationship. Coping strategies mitigate adverse climate-induced shocks on consumption aftershocks that smooth consumption over time. Support to increase the resilience capacity of households can involve efforts to make existing livelihoods and forms of production or reductions in the vulnerability of households. Therefore, government interventions are mandatory for asset accumulation agendas that support household coping strategies and respond to shocks. In addition, the dynamic linkage between consumption and significant socioeconomic and institutional factors should be taken into account to minimize the effect of climate-induced shocks on consumption dynamics.Keywords: climate shock, Ethiopia, fixed-effect model, food security
Procedia PDF Downloads 1152179 Emerging Technologies in Distance Education
Authors: Eunice H. Li
Abstract:
This paper discusses and analyses a small portion of the literature that has been reviewed for research work in Distance Education (DE) pedagogies that I am currently undertaking. It begins by presenting a brief overview of Taylor's (2001) five-generation models of Distance Education. The focus of the discussion will be on the 5th generation, Intelligent Flexible Learning Model. For this generation, educational and other institutions make portal access and interactive multi-media (IMM) an integral part of their operations. The paper then takes a brief look at current trends in technologies – for example smart-watch wearable technology such as Apple Watch. The emergent trends in technologies carry many new features. These are compared to former DE generational features. Also compared is the time span that has elapsed between the generations that are referred to in Taylor's model. This paper is a work in progress. The paper therefore welcome new insights, comparisons and critique of the issues discussed.Keywords: distance education, e-learning technologies, pedagogy, generational models
Procedia PDF Downloads 4612178 The Nexus of Federalism and Economic Development: A Politico-Economic Analysis of Balochistan, Pakistan
Authors: Rameesha Javaid
Abstract:
Balochistan, the largest landmass named after and dominated by the 55% Baloch population, which has had a difficult anti-center history like their brothers the Kurds of Middle East, reluctantly acceded to Pakistan in 1947. The region, which attained the status of a province after two decades of accession, has lagged behind in social development and economic growth as compared to the other three federating units. The province has seen the least financial autonomy and administrative decentralization both in autocratic and democratic dispensations under geostrategic and security considerations. Significant corrections have been recently made in the policy framework through changing the formula for intra-provincial National Finance Award, curtailing the number of subjects under federal control, and reactivating the Council of Common Interests. Yet policymaking remains overwhelmingly bureaucratic under a weak parliamentary oversight. The provincial coalition governments are unwieldy and directionless. The government machinery has much less than the optimal capability, character, integrity, will, and opportunity to perform. Decentralization further loses its semblance in the absence of local governments for long intervals and with the hold of hereditary tribal chiefs. Increased allocations failed to make an impact in the highest per capita cost environment due to long distances and scattered settlements. Decentralization, the basic ingredient of federalism has remained mortgaged to geo-strategic factors, internal security perceptions, autocratic and individualistic styles of governments, bureaucratic policymaking structures, bad governance, non-existent local governments, and feudalistic tribal lords. This suboptimal federalism speaks for the present underdevelopment in Balochistan and will earmark the milestones in the future.Keywords: Balochistan, economic development, federalism, political economy
Procedia PDF Downloads 3092177 The Influence of Meteorological Properties on the Power of Night Radiation Cooling
Authors: Othmane Fahim, Naoual Belouaggadia. Charifa David, Mohamed Ezzine
Abstract:
To make better use of cooling resources, systems have been derived on the basis of the use of night radiator systems for heat pumping. Using the TRNSYS tool we determined the influence of the climatic characteristics of the two zones in Morocco on the temperature of the outer surface of a Photovoltaic Thermal Panel “PVT” made of aluminum. The proposal to improve the performance of the panel allowed us to have little heat absorption during the day and give the same performance of a panel made of aluminum at night. The variation in the granite-based panel temperature recorded a deviation from the other materials of 0.5 °C, 2.5 °C on the first day respectively in Marrakech and Casablanca, and 0.2 °C and 3.2 °C on the second night. Power varied between 110.16 and 32.01 W/m² marked in Marrakech, to be the most suitable area to practice night cooling by night radiation.Keywords: smart buildings, energy efficiency, Morocco, radiative cooling
Procedia PDF Downloads 1502176 Potentials and Challenges of Implementing Participatory Irrigation Management, Tanzania
Authors: Pilly Joseph Kagosi
Abstract:
The study aims at assessing challenges observed during implementation of participatory irrigation management (PIM) approach for food security in semi-arid areas of Tanzania. Data were collected through questionnaire, PRA tools, key informants discussion, Focus Group Discussion (FGD), participant observation and literature review. Data collected from questionnaire was analyzed using SPSS while PRA data was analyzed with the help of local communities during PRA exercise. Data from other methods were analyzed using content analysis. The study revealed that PIM approach has contribution in improved food security at household level due to involvement of communities in water management activities and decision making which enhanced availability of water for irrigation and increased crop production. However there were challenges observed during implementation of the approach including; minimum participation of beneficiaries in decision making during planning and designing stages, meaning inadequate devolution of power among scheme owners; Inadequate and lack of transparency on income expenditure in Water Utilization Associations’ (WUAs), water conflict among WUAs members, conflict between farmers and livestock keepers and conflict between WUAs leaders and village government regarding training opportunities and status; WUAs rules and regulation are not legally recognized by the National court and few farmers involved in planting trees around water sources. However it was realized that some of the mentioned challenges were rectified by farmers themselves facilitated by government officials. The study recommends that, the identified challenges need to be rectified for farmers to realize impotence of PIM approach as it was realized by other Asian countries.Keywords: potentials of implementing participatory approach, challenges of participatory approach, irrigation management, Tanzania
Procedia PDF Downloads 3052175 Interactive Image Search for Mobile Devices
Authors: Komal V. Aher, Sanjay B. Waykar
Abstract:
Nowadays every individual having mobile device with them. In both computer vision and information retrieval Image search is currently hot topic with many applications. The proposed intelligent image search system is fully utilizing multimodal and multi-touch functionalities of smart phones which allows search with Image, Voice, and Text on mobile phones. The system will be more useful for users who already have pictures in their minds but have no proper descriptions or names to address them. The paper gives system with ability to form composite visual query to express user’s intention more clearly which helps to give more precise or appropriate results to user. The proposed algorithm will considerably get better in different aspects. System also uses Context based Image retrieval scheme to give significant outcomes. So system is able to achieve gain in terms of search performance, accuracy and user satisfaction.Keywords: color space, histogram, mobile device, mobile visual search, multimodal search
Procedia PDF Downloads 3662174 The Effects of an Immigration Policy on the Economic Integration of Migrants and on Natives’ Attitudes: The Case of Syrian Refugees in Turkey
Authors: S. Zeynep Siretioglu Girgin, Gizem Turna Cebeci
Abstract:
Turkey’s immigration policy is a controversial issue considering its legal, economic, social, and political and human rights dimensions. Formulation of an immigration policy goes hand in hand with political processes, where natives’ attitudes play a significant role. On the other hand, as was the case in Turkey, radical changes made in immigration policy or policies lacking transparency may cause severe reactions by the host society. The underlying discussion paper aims to analyze quantitatively the effects of the existing ‘open door’ immigration policy on the economic integration of Syrian refugees in Turkey, and on the perception of the native population of refugees. For the analysis, semi-structured in-depth interviews and focus group interviews have been conducted. After the introduction, a literature review is provided, followed by theoretical background on the explanation of natives’ attitudes towards immigrants. In the next section, a qualitative analysis of natives’ attitudes towards Syrian refugees is presented with the subtopics of (i) awareness, general opinions and expectations, (ii) open-door policy and management of the migration process, (iii) perception of positive and negative impacts of immigration, (iv) economic integration, and (v) cultural similarity. Results indicate that, natives concurrently have social, economic and security concerns regarding refugees, while difficulties regarding security and economic integration of refugees stand out. Socio-economic characteristics of the respondents, such as the educational level and employment status, are not sufficient to explain the overall attitudes towards refugees, while they can be used to explain the awareness of the respondents and the priority of the concerns felt.Keywords: economic integration, immigration policy, integration policies, migrants, natives’ sentiments, perception, Syrian refugees, Turkey
Procedia PDF Downloads 3542173 The Role of Social Media in the Rise of Islamic State in India: An Analytical Overview
Authors: Yasmeen Cheema, Parvinder Singh
Abstract:
The evolution of Islamic State (acronym IS) has an ultimate goal of restoring the caliphate. IS threat to the global security is main concern of international community but has also raised a factual concern for India about the regular radicalization of IS ideology among Indian youth. The incident of joining Arif Ejaz Majeed, an Indian as ‘jihadist’ in IS has set strident alarm in law & enforcement agencies. On 07.03.2017, many people were injured in an Improvised Explosive Device (IED) blast on-board of Bhopal Ujjain Express. One perpetrator of this incident was killed in encounter with police. But, the biggest shock is that the conspiracy was pre-planned and the assailants who carried out the blast were influenced by the ideology perpetrated by the Islamic State. This is the first time name of IS has cropped up in a terror attack in India. It is a red indicator of violent presence of IS in India, which is spreading through social media. The IS have the capacity to influence the younger Muslim generation in India through its brutal and aggressive propaganda videos, social media apps and hatred speeches. It is a well known fact that India is on the radar of IS, as well on its ‘Caliphate Map’. IS uses Twitter, Facebook and other social media platforms constantly. Islamic State has used enticing videos, graphics, and articles on social media and try to influence persons from India & globally that their jihad is worthy. According to arrested perpetrator of IS in different cases in India, the most of Indian youths are victims to the daydreams which are fondly shown by IS. The dreams that the Muslim empire as it was before 1920 can come back with all its power and also that the Caliph and its caliphate can be re-established are shown by the IS. Indian Muslim Youth gets attracted towards these euphemistic ideologies. Islamic State has used social media for disseminating its poisonous ideology, recruitment, operational activities and for future direction of attacks. IS through social media inspired its recruits & lone wolfs to continue to rely on local networks to identify targets and access weaponry and explosives. Recently, a pro-IS media group on its Telegram platform shows Taj Mahal as the target and suggested mode of attack as a Vehicle Born Improvised Explosive Attack (VBIED). Islamic State definitely has the potential to destroy the Indian national security & peace, if timely steps are not taken. No doubt, IS has used social media as a critical mechanism for recruitment, planning and executing of terror attacks. This paper will therefore examine the specific characteristics of social media that have made it such a successful weapon for Islamic State. The rise of IS in India should be viewed as a national crisis and handled at the central level with efficient use of modern technology.Keywords: ideology, India, Islamic State, national security, recruitment, social media, terror attack
Procedia PDF Downloads 2282172 Spatial Audio Player Using Musical Genre Classification
Authors: Jun-Yong Lee, Hyoung-Gook Kim
Abstract:
In this paper, we propose a smart music player that combines the musical genre classification and the spatial audio processing. The musical genre is classified based on content analysis of the musical segment detected from the audio stream. In parallel with the classification, the spatial audio quality is achieved by adding an artificial reverberation in a virtual acoustic space to the input mono sound. Thereafter, the spatial sound is boosted with the given frequency gains based on the musical genre when played back. Experiments measured the accuracy of detecting the musical segment from the audio stream and its musical genre classification. A listening test was performed based on the virtual acoustic space based spatial audio processing.Keywords: automatic equalization, genre classification, music segment detection, spatial audio processing
Procedia PDF Downloads 4282171 Energy Initiatives for Turkey
Authors: A.Beril Tugrul, Selahattin Cimen
Abstract:
Dependency of humanity on the energy is ever-increasing today and the energy policies are reaching undeniable and un-ignorable dimensions steering the political events as well. Therefore, energy has the highest priority for Turkey like any other country. In this study, the energy supply security for Turkey evaluated according to the strategic criteria of energy policy. Under these circumstances, different alternatives are described and assessed with in terms of the energy expansion of Turkey. With this study, different opportunities in the energy expansion of Turkey is clarified and emphasized.Keywords: energy policy, energy strategy, future projection, Turkey
Procedia PDF Downloads 3872170 Advancing Agriculture through Technology: An Abstract of Research Findings
Authors: Eugene Aninagyei-Bonsu
Abstract:
Introduction: Agriculture has been a cornerstone of human civilization, ensuring food security and livelihoods for billions of people worldwide. In recent decades, rapid advancements in technology have revolutionized the agricultural sector, offering innovative solutions to enhance productivity, sustainability, and efficiency. This abstract summarizes key findings from a research study that explores the impacts of technology in modern agriculture and its implications for future food production systems. Methodologies: The research study employed a mixed-methods approach, combining quantitative data analysis with qualitative interviews and surveys to gain a comprehensive understanding of the role of technology in agriculture. Data was collected from various stakeholders, including farmers, agricultural technicians, and industry experts, to capture diverse perspectives on the adoption and utilization of agricultural technologies. The study also utilized case studies and literature reviews to contextualize the findings within the broader agricultural landscape. Major Findings: The research findings reveal that technology plays a pivotal role in transforming traditional farming practices and driving innovation in agriculture. Advanced technologies such as precision agriculture, drone technology, genetic engineering, and smart irrigation systems have significantly improved crop yields, reduced environmental impact, and optimized resource utilization. Farmers who have embraced these technologies have reported increased productivity, enhanced profitability, and improved resilience to environmental challenges. Furthermore, the study highlights the importance of accessible and affordable technology solutions for smallholder farmers in developing countries. Mobile applications, sensor technologies, and digital platforms have enabled small-scale farmers to access market information, weather forecasts, and agricultural best practices, empowering them to make informed decisions and improve their livelihoods. The research emphasizes the need for targeted policies and investments to bridge the digital divide and promote equitable technology adoption in agriculture. Conclusion: In conclusion, this research underscores the transformative potential of technology in agriculture and its critical role in advancing sustainable food production systems. The findings suggest that harnessing technology can address key challenges facing the agricultural sector, including climate change, resource scarcity, and food insecurity. By embracing innovation and leveraging technology, farmers can enhance their productivity, profitability, and resilience in a rapidly evolving global food system. Moving forward, policymakers, researchers, and industry stakeholders must collaborate to facilitate the adoption of appropriate technologies, support capacity building, and promote sustainable agricultural practices for a more resilient and food-secure future.Keywords: technology development in modern agriculture, the influence of information technology access in agriculture, analyzing agricultural technology development, analyzing of the frontier technology of agriculture loT
Procedia PDF Downloads 342169 A Multi-Perspective, Qualitative Study into Quality of Life for Elderly People Living at Home and the Challenges for Professional Services in the Netherlands
Authors: Hennie Boeije, Renate Verkaik, Joke Korevaar
Abstract:
In Dutch national policy, it is promoted that the elderly remain living at home longer. They are less often admitted to a nursing home or only later in life. While living at home, it is important that they experience a good quality of life. Care providers in primary care support this. In this study, it was investigated what quality of life means for the elderly and which characteristics care should have that supports living at home longer with quality of life. To explore this topic, a qualitative methodology was used. Four focus groups were conducted: two with elderly people who live at home and their family caregivers, one with district nurses employed in-home care services and one with elderly care physicians working in primary care. Next to this individual interviews were employed with general practitioners (GPs). In total 32 participants took part in the study. The data were thematically analysed with MaxQDA software for qualitative analysis and reported. Quality of life is a multi-faceted term for elderly. The essence of their description is that they can still undertake activities that matter to them. Good physical health, mental well-being and social connections enable them to do this. Own control over their life is important for some. They are of opinion that how they experience life and manage old age is related to their resilience and coping. Key terms in the definitions of quality of life by GPs are also physical and mental health and social contacts. These are the three pillars. Next, to this elderly care, physicians mention security and safety and district nurses add control over their own life and meaningful daily activities. They agree that with frail elderly people, the balance is delicate and a change in one of the three pillars can cause it to collapse like a house of cards. When discussing what support is needed, professionals agree on access to care with a low threshold, prevention, and life course planning. When care is provided in a timely manner, a worsening of the situation can be prevented. They agree that hospital care often is not needed since most of the problems with the elderly have to do with care and security rather than with a cure per se. GPs can consult elderly care physicians to lower their workload and to bring in specific knowledge. District nurses often signal changes in the situation of the elderly. According to them, the elderly predominantly need someone to watch over them and provide them with a feeling of security. Life course planning and advance care planning can contribute to uniform treatment in line with older adults’ wishes. In conclusion, all stakeholders, including elderly persons, agree on what entails quality of life and the quality of care that is needed to support that. A future challenge is to shape conditions for the right skill mix of professionals, cooperation between the professions and breaking down differences in financing and supply. For the elderly, the challenge is preparing for aging.Keywords: elderly living at home, quality of life, quality of care, professional cooperation, life course planning, advance care planning
Procedia PDF Downloads 1282168 Real-Time Online Tracking Platform
Authors: Denis Obrul, Borut Žalik
Abstract:
We present an extendable online real-time tracking platform that can be used to track a wide variety of location-aware devices. These can range from GPS devices mounted inside a vehicle, closed and secure systems such as Teltonika and to mobile phones running multiple platforms. Special consideration is given to decentralized approach, security and flexibility. A number of different use cases are presented as a proof of concept.Keywords: real-time, online, gps, tracking, web application
Procedia PDF Downloads 3512167 Interwoven Realms: The Relationship Between Textiles, Fashion, and Architecture
Authors: Toktam mehrabani
Abstract:
Textiles, fashion, and architecture, though seemingly disparate fields, share a deep and evolving relationship. This paper explores the intersection of these disciplines, examining how the tactile, structural, and aesthetic qualities of textiles have influenced both fashion and architecture over time. By investigating historical and contemporary examples, this paper seeks to unravel the ways in which textiles and fashion have not only shaped architectural design but have also acted as a bridge between functionality, art, and human experience in the built environment.Textiles have been integral to human culture since the dawn of civilization. Their presence transcends mere functionality, serving as a medium for artistic expression, cultural identity, and social commentary. Fashion, derived from textiles, has long been associated with personal identity and societal trends, while architecture reflects human needs, environmental context, and cultural values. This paper posits that the relationship between textiles, fashion, and architecture is more interconnected than often perceived, with each influencing and inspiring the other across time. Textiles in Architectural Design: From ancient draperies in temples to tapestries in castles, textiles have adorned structures, softening rigid spaces and adding layers of warmth and luxury. Fabric screens and curtains have also served functional purposes, such as controlling light, acoustics, and temperature. Fashion as Architectural Expression: Renaissance and Baroque fashion used exaggerated forms, corsetry, and layers to mirror the grandiosity of architectural styles of the time. Clothing acted as wearable architecture, with structured garments mirroring the strong lines and curves of buildings..Structural Textiles in Architecture: In the 21st century, textiles are no longer just decorative; they have become integral to architectural innovation. Materials like tensile fabrics and smart textiles are used in creating flexible, lightweight structures. Iconic examples include Frei Otto’s work with tensile membranes, seen in the Munich Olympic Stadium.Technological advancements have drastically transformed the relationship between textiles, fashion, and architecture. Digital tools like 3D printing and laser cutting allow designers in both fields to push the limits of form and structure. Smart textiles that react to environmental stimuli are being explored for use in both wearable technology and adaptable architecture, such as facades that change in response to weather conditions. Textiles, fashion, and architecture are inextricably linked through their shared exploration of form, structure, and expression. This interdisciplinary relationship continues to evolve, driven by technological advancements and a growing emphasis on sustainability. As fashion becomes more architectural in its construction and architecture more fluid in its forms, the lines between these disciplines blur, offering new possibilities for creativity and functionality in both wearable and built environments.Keywords: textiles in architecture, fashion and architecture, textile architecture, structural textiles, wearable architecture, architectural fashion
Procedia PDF Downloads 282166 The Impact of Household Income on Students' Financial Literacy
Authors: Dorjana Nano
Abstract:
Financial literacy has become on focus of many research studies. Family household is found to influence students’ financial literacy. The purpose of this study is to explore whether financial literacy of Albanian students is associated with their family household. The main objectives of this research are: i) firstly, to evaluate how financial literate are Albanian university students; ii) secondly, to examine whether the financial literacy differs based on the level of students family income; and iii) finally, to draw some conclusions and recommendations in order to improve student’s financial literacy. An instrument, comprised of personal finance and personal characteristics is administered to 637 students in Albania. The constituency of the survey is tested based on the dimension reduction and factor analyzing techniques. The One Way Welch ANOVA and multiple comparison techniques are utilized to analyze the data. The results indicate that student’s financial literacy is influenced by their family income.Keywords: financial literacy, household income, smart decisions, university students
Procedia PDF Downloads 2702165 The Use of Computer Simulation as Technological Education for Crisis Management Staff
Authors: Jiří Barta, Josef Krahulec, Jiří F. Urbánek
Abstract:
Education and practical training crisis management members are a topical issue nowadays. The paper deals with the perspectives and possibilities of ‘smart solutions’ to education for crisis management staff. Currently, there are a large number of simulation tools, which notes that they are suitable for practical training of crisis management staff. The first part of the paper is focused on the introduction of the technology simulation tools. The simulators aim is to create a realistic environment for the practical training of extending units of crisis staff. The second part of the paper concerns the possibilities of using the simulation technology to the education process. The aim of this section is to introduce the practical capabilities and potential of the simulation programs for practical training of crisis management staff.Keywords: crisis management staff, computer simulation, software, technological education
Procedia PDF Downloads 3522164 Modelling the Dynamics and Optimal Control Strategies of Terrorism within the Southern Borno State Nigeria
Authors: Lubem Matthew Kwaghkor
Abstract:
Terrorism, which remains one of the largest threats faced by various nations and communities around the world, including Nigeria, is the calculated use of violence to create a general climate of fear in a population to attain particular goals that might be political, religious, or economical. Several terrorist groups are currently active in Nigeria, leading to attacks on both civil and military targets. Among these groups, Boko Haram is the deadliest terrorist group operating majorly in Borno State. The southern part of Borno State in North-Eastern Nigeria has been plagued by terrorism, insurgency, and conflict for several years. Understanding the dynamics of terrorism is crucial for developing effective strategies to mitigate its impact on communities and to facilitate peace-building efforts. This research aims to develop a mathematical model that captures the dynamics of terrorism within the southern part of Borno State, Nigeria, capturing both government and local community intervention strategies as control measures in combating terrorism. A compartmental model of five nonlinear differential equations is formulated. The model analyses show that a feasible solution set of the model exists and is bounded. Stability analyses show that both the terrorism free equilibrium and the terrorism endermic equilibrium are asymptotically stable, making the model to have biological meaning. Optimal control theory will be employed to identify the most effective strategy to prevent or minimize acts of terrorism. The research outcomes are expected to contribute towards enhancing security and stability in Southern Borno State while providing valuable insights for policymakers, security agencies, and researchers. This is an ongoing research.Keywords: modelling, terrorism, optimal control, susceptible, non-susceptible, community intervention
Procedia PDF Downloads 192163 Application of Deep Learning Algorithms in Agriculture: Early Detection of Crop Diseases
Authors: Manaranjan Pradhan, Shailaja Grover, U. Dinesh Kumar
Abstract:
Farming community in India, as well as other parts of the world, is one of the highly stressed communities due to reasons such as increasing input costs (cost of seeds, fertilizers, pesticide), droughts, reduced revenue leading to farmer suicides. Lack of integrated farm advisory system in India adds to the farmers problems. Farmers need right information during the early stages of crop’s lifecycle to prevent damage and loss in revenue. In this paper, we use deep learning techniques to develop an early warning system for detection of crop diseases using images taken by farmers using their smart phone. The research work leads to building a smart assistant using analytics and big data which could help the farmers with early diagnosis of the crop diseases and corrective actions. The classical approach for crop disease management has been to identify diseases at crop level. Recently, ImageNet Classification using the convolutional neural network (CNN) has been successfully used to identify diseases at individual plant level. Our model uses convolution filters, max pooling, dense layers and dropouts (to avoid overfitting). The models are built for binary classification (healthy or not healthy) and multi class classification (identifying which disease). Transfer learning is used to modify the weights of parameters learnt through ImageNet dataset and apply them on crop diseases, which reduces number of epochs to learn. One shot learning is used to learn from very few images, while data augmentation techniques are used to improve accuracy with images taken from farms by using techniques such as rotation, zoom, shift and blurred images. Models built using combination of these techniques are more robust for deploying in the real world. Our model is validated using tomato crop. In India, tomato is affected by 10 different diseases. Our model achieves an accuracy of more than 95% in correctly classifying the diseases. The main contribution of our research is to create a personal assistant for farmers for managing plant disease, although the model was validated using tomato crop, it can be easily extended to other crops. The advancement of technology in computing and availability of large data has made possible the success of deep learning applications in computer vision, natural language processing, image recognition, etc. With these robust models and huge smartphone penetration, feasibility of implementation of these models is high resulting in timely advise to the farmers and thus increasing the farmers' income and reducing the input costs.Keywords: analytics in agriculture, CNN, crop disease detection, data augmentation, image recognition, one shot learning, transfer learning
Procedia PDF Downloads 1172162 LuMee: A Centralized Smart Protector for School Children who are Using Online Education
Authors: Lumindu Dilumka, Ranaweera I. D., Sudusinghe S. P., Sanduni Kanchana A. M. K.
Abstract:
This study was motivated by the challenges experienced by parents and guardians in ensuring the safety of children in cyberspace. In the last two or three years, online education has become very popular all over the world due to the Covid 19 pandemic. Therefore, parents, guardians and teachers must ensure the safety of children in cyberspace. Children are more likely to go astray and there are plenty of online programs are waiting to get them on the wrong track and also, children who are engaging in the online education can be distracted at any moment. Therefore, parents should keep a close check on their children's online activity. Apart from that, due to the unawareness of children, they tempt to share their sensitive information, causing a chance of being a victim of phishing attacks from outsiders. These problems can be overcome through the proposed web-based system. We use feature extraction, web tracking and analysis mechanisms, image processing and name entity recognition to implement this web-based system.Keywords: online education, cyber bullying, social media, face recognition, web tracker, privacy data
Procedia PDF Downloads 862161 The Crossroads of Corruption and Terrorism in the Global South
Authors: Stephen M. Magu
Abstract:
The 9/11 and Christmas bombing attacks in the United States are mostly associated with the inability of intelligence agencies to connect dots based on intelligence that was already available. The 1998, 2002, 2013 and several 2014 terrorist attacks in Kenya, on the other hand, are probably driven by a completely different dynamic: the invisible hand of corruption. The World Bank and Transparency International annually compute the Worldwide Governance Indicators and the Corruption Perception Index respectively. What perhaps is not adequately captured in the corruption metrics is the impact of corruption on terrorism. The World Bank data includes variables such as the control of corruption, (estimates of) government effectiveness, political stability and absence of violence/terrorism, regulatory quality, rule of law and voice and accountability. TI's CPI does not include measures related to terrorism, but it is plausible that there is an expectation of some terrorism impact arising from corruption. This paper, by examining the incidence, frequency and total number of terrorist attacks that have occurred especially since 1990, and further examining the specific cases of Kenya and Nigeria, argues that in addition to having major effects on governance, corruption has an even more frightening impact: that of facilitating and/or violating security mechanisms to the extent that foreign nationals can easily obtain identification that enables them to perpetuate major events, targeting powerful countries' interests in countries with weak corruption-fighting mechanisms. The paper aims to model interactions that demonstrate the cost/benefit analysis and agents' rational calculations as being non-rational calculations, given the ultimate impact. It argues that eradication of corruption is not just a matter of a better business environment, but that it is implicit in national security, and that for anti-corruption crusaders, this is an argument more potent than the economic cost / cost of doing business argument.Keywords: corruption, global south, identification, passports, terrorism
Procedia PDF Downloads 4212160 Combination between Intrusion Systems and Honeypots
Authors: Majed Sanan, Mohammad Rammal, Wassim Rammal
Abstract:
Today, security is a major concern. Intrusion Detection, Prevention Systems and Honeypot can be used to moderate attacks. Many researchers have proposed to use many IDSs ((Intrusion Detection System) time to time. Some of these IDS’s combine their features of two or more IDSs which are called Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS, if an attacker attacks slowly and in organized way, the attack may go undetected through the IDS, as signatures include factors based on duration of the events but the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. So there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we propose a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time. We have discussed experimental results performed: both the Honeypot and Anomaly based IDS have some shortcomings but if we hybridized these two technologies, the newly proposed Hybrid Intrusion Detection System (HIDS) is capable enough to overcome these shortcomings with much enhanced performance. In this paper, we present a modified Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies - Honeypot methodology and anomaly based intrusion detection methodology. In the experiment, we ran both the Intrusion Detection System individually first and then together and recorded the data from time to time. From the data we can conclude that the resulting IDS are much better in detecting intrusions from the existing IDSs.Keywords: security, intrusion detection, intrusion prevention, honeypot, anomaly-based detection, signature-based detection, cloud computing, kfsensor
Procedia PDF Downloads 3752159 Big Data and Health: An Australian Perspective Which Highlights the Importance of Data Linkage to Support Health Research at a National Level
Authors: James Semmens, James Boyd, Anna Ferrante, Katrina Spilsbury, Sean Randall, Adrian Brown
Abstract:
‘Big data’ is a relatively new concept that describes data so large and complex that it exceeds the storage or computing capacity of most systems to perform timely and accurate analyses. Health services generate large amounts of data from a wide variety of sources such as administrative records, electronic health records, health insurance claims, and even smart phone health applications. Health data is viewed in Australia and internationally as highly sensitive. Strict ethical requirements must be met for the use of health data to support health research. These requirements differ markedly from those imposed on data use from industry or other government sectors and may have the impact of reducing the capacity of health data to be incorporated into the real time demands of the Big Data environment. This ‘big data revolution’ is increasingly supported by national governments, who have invested significant funds into initiatives designed to develop and capitalize on big data and methods for data integration using record linkage. The benefits to health following research using linked administrative data are recognised internationally and by the Australian Government through the National Collaborative Research Infrastructure Strategy Roadmap, which outlined a multi-million dollar investment strategy to develop national record linkage capabilities. This led to the establishment of the Population Health Research Network (PHRN) to coordinate and champion this initiative. The purpose of the PHRN was to establish record linkage units in all Australian states, to support the implementation of secure data delivery and remote access laboratories for researchers, and to develop the Centre for Data Linkage for the linkage of national and cross-jurisdictional data. The Centre for Data Linkage has been established within Curtin University in Western Australia; it provides essential record linkage infrastructure necessary for large-scale, cross-jurisdictional linkage of health related data in Australia and uses a best practice ‘separation principle’ to support data privacy and security. Privacy preserving record linkage technology is also being developed to link records without the use of names to overcome important legal and privacy constraint. This paper will present the findings of the first ‘Proof of Concept’ project selected to demonstrate the effectiveness of increased record linkage capacity in supporting nationally significant health research. This project explored how cross-jurisdictional linkage can inform the nature and extent of cross-border hospital use and hospital-related deaths. The technical challenges associated with national record linkage, and the extent of cross-border population movements, were explored as part of this pioneering research project. Access to person-level data linked across jurisdictions identified geographical hot spots of cross border hospital use and hospital-related deaths in Australia. This has implications for planning of health service delivery and for longitudinal follow-up studies, particularly those involving mobile populations.Keywords: data integration, data linkage, health planning, health services research
Procedia PDF Downloads 2152158 The Twin Terminal of Pedestrian Trajectory Based on City Intelligent Model (CIM) 4.0
Authors: Chen Xi, Lao Xuerui, Li Junjie, Jiang Yike, Wang Hanwei, Zeng Zihao
Abstract:
To further promote the development of smart cities, the microscopic "nerve endings" of the City Intelligent Model (CIM) are extended to be more sensitive. In this paper, we develop a pedestrian trajectory twin terminal based on the CIM and CNN technology. It also uses 5G networks, architectural and geoinformatics technologies, convolutional neural networks, combined with deep learning networks for human behaviour recognition models, to provide empirical data such as 'pedestrian flow data and human behavioural characteristics data', and ultimately form spatial performance evaluation criteria and spatial performance warning systems, to make the empirical data accurate and intelligent for prediction and decision making.Keywords: urban planning, urban governance, CIM, artificial intelligence, convolutional neural network
Procedia PDF Downloads 143